First published: Wed Mar 13 2019(Updated: )
A vulnerability in the Cisco Common Services Platform Collector (CSPC) could allow an unauthenticated, remote attacker to access an affected device by using an account that has a default, static password. This account does not have administrator privileges. The vulnerability exists because the affected software has a user account with a default, static password. An attacker could exploit this vulnerability by remotely connecting to the affected system using this account. A successful exploit could allow the attacker to log in to the CSPC using the default account. For Cisco CSPC 2.7.x, Cisco fixed this vulnerability in Release 2.7.4.6. For Cisco CSPC 2.8.x, Cisco fixed this vulnerability in Release 2.8.1.2.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Common Services Platform Collector | >=2.7.2<2.7.4.6 | |
Cisco Common Services Platform Collector | >=2.8.0<2.8.1.2 | |
>=2.7.2<2.7.4.6 | ||
>=2.8.0<2.8.1.2 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190313-cspcscv
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Cisco Common Services Platform Collector vulnerability is CVE-2019-1723.
The severity of CVE-2019-1723 is critical.
CVE-2019-1723 allows an unauthenticated remote attacker to access an affected device using a default, static password.
No, authentication is not required to exploit CVE-2019-1723.
To fix CVE-2019-1723, upgrade to a version between 2.8.0 and 2.8.1.2 or install a version between 2.7.2 and 2.7.4.6 of the Cisco Common Services Platform Collector.